General
-
Target
a48c7cc4d8405009f7cc2e1e5f354a869e6fc969d912cad3e6a787927ec05caf
-
Size
956KB
-
Sample
230129-wc4gssfh78
-
MD5
6e093085b6a2bc06e04c1deddb51adb4
-
SHA1
193821bf881ada438c63862e20001458778b8f42
-
SHA256
a48c7cc4d8405009f7cc2e1e5f354a869e6fc969d912cad3e6a787927ec05caf
-
SHA512
e734dd6c79cd48fbbc050381bc01fc17856a5af5219b472841cf5544f3b4f7cf46b763311c91085b4a1a130791ceee67a0efa0ca2d13ded621cfdf1064f7eb38
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qM:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPu
Static task
static1
Behavioral task
behavioral1
Sample
a48c7cc4d8405009f7cc2e1e5f354a869e6fc969d912cad3e6a787927ec05caf.dll
Resource
win7-20221111-en
Malware Config
Extracted
gozi
Extracted
gozi
1000
http://ey7kuuklgieop2pq.onion
http://maiamirainy.at
http://drunt.at
http://news-deck.at
-
build
216098
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
worker
-
server_id
12
Targets
-
-
Target
a48c7cc4d8405009f7cc2e1e5f354a869e6fc969d912cad3e6a787927ec05caf
-
Size
956KB
-
MD5
6e093085b6a2bc06e04c1deddb51adb4
-
SHA1
193821bf881ada438c63862e20001458778b8f42
-
SHA256
a48c7cc4d8405009f7cc2e1e5f354a869e6fc969d912cad3e6a787927ec05caf
-
SHA512
e734dd6c79cd48fbbc050381bc01fc17856a5af5219b472841cf5544f3b4f7cf46b763311c91085b4a1a130791ceee67a0efa0ca2d13ded621cfdf1064f7eb38
-
SSDEEP
24576:mOrDG3wBlTQGKG7psOQhbwDk3lc+sv0cnVWezj8Q9gasYWenxvXf+k+7bff663qM:3q8lMGtpsOQhbwDYlc+svvWezoQ9gaPu
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-